Refer to the ASCII table from Question 7. Which ASCII character is represented by the decimal (base 10) number 120? a c 78 x

Answers

Answer 1

The ASCII character that is represented by the decimal (base 10) number 120 is: x.

What is ASCII?

ASCII is an acronym for American Standard Code for Information Interchange and it was developed from a telegraph code. Also, it is a character encoding standard that comprises seven-bit (7-bit) set of codes.

The function of a ASCII character set.

The ASCII character set can only be used for encoding English language and it comprises both lower case and upper case letters of the 26 alphabets, symbols, and number 0 to 9.

Based on the ASCII table, the American Standard Code for Information Interchange (ASCII) character that is represented by the decimal (base 10) number 120 is x.

Read more on ASCII here: https://brainly.com/question/15849452

Refer To The ASCII Table From Question 7. Which ASCII Character Is Represented By The Decimal (base 10)
Answer 2

Answer:

Tis X

Explananation:

I got it right on codehs


Related Questions

(I made this up teehee) what anime is katski bakugo from

Answers

Scooby do because that is the best shower ever
MHA (My Hero Academia) or Boku no hero academia

Hey! I was recommended a site “9anime” the other day. All’s been going well but I accidentally taped on a new dub settingZ something stream mode or something. Now whenever I go on thermos and click it’ll redirect me to a vpn page or something. One time it said that something might be watch what I watch. Virus?

Answers

Answer:

yep defiantly virus

Explanation:

bro what this is brainly

If you want the words “My puppy is a poodle” to appear in the interpreter. What code should you use?

A.
create "My puppy is a poodle"

B.
execute ("My puppy is a poodle")

C.
print("My puppy is a poodle")

D.
print "My puppy is a poodle"

Answers

Answer: Probably C


(also, C and D say the same thing)

I think It’s probably c :)

The first person gets the brainiest!!!
Match the areas seen on the presentation program’s interface with their uses.

A. Placeholder

B. Speaker Note

C. Slide Master

D. Theme


1. default template for any new presentation

2. predefined appearance of a slide

3.used to insert the choice of items on a slide

4. guidelines that assist in delivering the presentation

Where is my Plato/ Edmentum at???

Answers

Answer:

1A

2D

3C

4B

Explanation:

:)

1 is A
2 is D
3 is C
and
4 is B

What is your prediction for the future of the internet in the next 20 years?

Answers

Answer:

The future of the Internet over the next two decades and beyond is most likely to see a whole new hyperconnected world of networked people, objects, and systems capable of transforming, reframing, and undermining the established norms of business and society.

My prediction of the future is that technology will keep having an increase of advancement leading to more achievements and discoveries of different areas of life

60 POINTS IF YOU GET IT RIGHT
PLEASE HELP ASAP!!!!!!!!
I already did the trials, and I found the loudest sound.
I will ask another question that includes the rest of the screen shots.

60 POINTS IF YOU GET IT RIGHTPLEASE HELP ASAP!!!!!!!!I already did the trials, and I found the loudest
60 POINTS IF YOU GET IT RIGHTPLEASE HELP ASAP!!!!!!!!I already did the trials, and I found the loudest
60 POINTS IF YOU GET IT RIGHTPLEASE HELP ASAP!!!!!!!!I already did the trials, and I found the loudest
60 POINTS IF YOU GET IT RIGHTPLEASE HELP ASAP!!!!!!!!I already did the trials, and I found the loudest
60 POINTS IF YOU GET IT RIGHTPLEASE HELP ASAP!!!!!!!!I already did the trials, and I found the loudest

Answers

Answer:

You said this was 60 points but it is only 30 points :(

Explanation:

Can you explain a little more , so I can help you better ?

What kind of personal information are you comfortable sharing with others online? Why? What steps do you take to control how that information is shared?

Answers

Answer:

this is more of an opinion question regarding what you personally do

Answer:

i mean the givens like age sex general location

Who plays Poliblicy?

Answers

Answer:

it a game that i don't play

Explanation:

btw i just search it up

2-3=5 but I don’t play the game is

what are some basic commands to remember in terminal? windows 10

please help if you know

Answers

Answer:

If you just need a few, maybe this can help.

Explanation:

Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.

Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.

Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.

Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.

Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.

1.Assoc

Most files in Windows are associated with a specific program that is assigned to open the file by default. At times, remembering these associations can become confusing. You can remind yourself by entering the command assoc to display a full list of filename extensions and program associations. You can also extend the command to change file associations. For example, assoc .txt= will change the file association for text files to whatever program you enter after the equal sign. The assoc command itself will reveal both the extension names and program names, which will help you properly use this command.

In Windows 10, you can view a more user-friendly interface that also lets you change file type associations on the spot. Head to Settings (Windows + I) > Apps > Default apps > Choose default app by file type

2.Cipher

Deleting files on a mechanical hard drive doesn't really delete them at all. Instead, it marks the files as no longer accessible and the space they took up as free. The files remain recoverable until the system overwrites them with new data, which can take some time. The cipher command, however, lets you wipe a directory on an NTFS-formatted volume by writing random data to it. To wipe your C drive, for example, you'd use the cipher /w:d command, which will wipe free space on the drive. The command does not overwrite undeleted data, so you will not wipe out the files you need by running this command.

When you run the cipher command by itself, it returns the encryption state of the current directory and the files it contains. Use cipher /e: to encrypt a file, cipher /c: to retrieve information about encrypted files, and cipher /d: to decrypt the selected file. Most of these commands are redundant with the Windows encryption tool BitLocker.

3.file Compare

You can use this command to identify differences in text between two files. It's particularly useful for writers and programmers trying to find small changes between two versions of a file. Simply type fc and then the directory path and file name of the two files you want to compare.

You can also extend the command in several ways. Typing /b compares only binary output, /c disregards the case of text in the comparison, and /l only compares ASCII text.

So, for example, you could use the following:

fc /l "C:\Program Files (x86)
The above command compares ASCII text in two Word documents.

4.Ipconfig

This command relays the IP address that your computer is currently using. However, if you're behind a router (like most computers today), you'll instead receive the local network address of the router.

Still, ipconfig is useful because of its extensions. ipconfig /release followed by ipconfig /renew can force your Windows PC into asking for a new IP address, which is useful if your computer claims one isn't available. You can also use ipconfig /flushdns to refresh your DNS address. These commands are great if the Windows network troubleshooter chokes, which does happen on occasion.

5.Netstat

Entering the command netstat -an will provide you with a list of currently open ports and related IP addresses. This command will also tell you what state the port is in; listening, established, or closed.

This is a great command for when you're trying to troubleshoot devices connected to your PC or when you fear a Trojan infected your system and you're trying to locate a malicious connection.

6.Ping

Sometimes, you need to know whether or not packets are making it to a specific networked device. That's where ping comes in handy.

Typing ping followed by an IP address or web domain will send a series of test packets to the specified address. If they arrive and are returned, you know the device is capable of communicating with your PC; if it fails, you know that there's something blocking communication between the device and your computer. This can help you decide if the root of the issue is an improper configuration or a failure of network hardware.

7.PathPing

This is a more advanced version of ping that's useful if there are multiple routers between your PC and the device you're testing. Like ping, you use this command by typing pathping followed by the IP address, but unlike ping, pathping also relays some information about the route the test packets take.

If you want text to appear sequentially, or one line after another, on a slide, you can add a(n)

A.
font color.
B.
font face.
C.
animation.
D.
slide design.

Answers

Answer: Animation

Explanation: I took the practice assessment this was the correct answer! ^^

A friend of a friend needs a place to stay. He’s offered you $200 to camp out in your living room.
WHAT DO YOU WANT TO DO?

(A.)SAY YES

(B.)SAY NO

Answers

Answer:

A.

i wouldn't say no to that Who would?

Explanation:

The real question is, is how long does he want to stay?

On the planet Mongo, each year has 15 months and each month has 26 days.
Write a function compute_mongo_age(birthYear, birthMonth, birthDay, currentYear, currentMonth, currentDay)
that residents of Mongo can use to compute their age. It should take 6 positive integers as input: the person's birthdate (year, month from 1 to 15, and day from 1 to 26) and the current date (year, month from 1 to 15, and day from 1 to 26), and return a float of the age of the person in years.

For example, print(compute_mongo_age(2879,8,11,2892,2,21)) should print 12.6256410256, the age (in Mongo years) of a person, who was born on the 11th day of the 8th month of the year 2879, is on the 21st day of the 2nd month of the year 2892.

Answers

Answer:

DateTime now = DateTime.Today;

int age = now.Year - bday.Year;

if (now < bday.AddYears(age))

age--;

So your helper method would look like:

public static string Age(this HtmlHelper helper, DateTime birthday)

{

DateTime now = DateTime.Today;

int age = now.Year - birthday.Year;

if (now < birthday.AddYears(age))

age--;

Which best describes desktop publishing? the process of designing and laying out printed material the positioning of text, graphics, and white space on a page the style of letters and how they are arranged the use of images and colors

Answers

Explanation:

the process of designing and laying out printed material.

Answer:A photographic proof where all colors are shown in blue, best used for spot color jobs, and it is used primarily to ... WYSIWYG is technical jargon that describes.

Explanation:

If I want to Save a file, what Menu do I go to? Question 1 options: Help View Insert Home

Answers

Answer:

ANS:- crtl s

Explanation:

crtl s is use to save a file in computer

Answer:

To save a file, you can click the Save icon in the top-left corner, click File>Save , or use the shortcut Ctrl+S (Command+S for Macs). Click the save icon (above) or File>New (below).

What is the name given to the parts of a computer that you can actually
touch?
Software
Computer Parts
Computer Case
Hardware

Answers

Answer:

Hardware

Explanation:

Hardware, is the parts of the computer that you can physically touch. Examples include, the keyboard and mouse.

Hope this helps. <3

Hardware is the name given to the parts of a computer that you can actually touch.

What is Hardware?

The physical components of a computer, such as its chassis, CPU, RAM, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers, and motherboard, are referred to as computer hardware. 

Software, on the other hand, is a collection of instructions that may be stored and executed by hardware. Software is referred to as "soft" because it is flexible, but hardware is referred to as "hard" because it is rigid in terms of modifications.

Software often instructs hardware to carry out any command or instruction. A useful computer system is one that combines hardware and software, while there are also systems that use simply hardware.

Therefore, Hardware is the name given to the parts of a computer that you can actually touch.

To learn more about Hardware, refer to the link:

https://brainly.com/question/15232088

#SPJ5

10.
The following are ways to avoid having a collision
EXCEPT:
a. anticipate possible situations before they occur
b. riding too close to a boat in order to jump its wake
C. realizing that personal watercraft take time to stop
d. knowing that you need throttle to steer a PWC

Answers

Answer: B

Explanation:

All the given demonstrate the ways in which a collision can be prevented except 'riding too close to a boat in order to jump its wake.'

'Collision' is described as the 'event in which two or more bodies exert forces on each other in a comparatively shorter time.'

In order to prevent a collision, it is important to:

Predict the probable circumstances that may occur in order to be prepared in advance for dealing with it.Understanding of one's vehicle and its features so that in emergency situations, timely actions like pulling the brakes, etc. can be taken.Recognizing the idea that one is required to control the navigation of the PWC in order to keep it balanced and right on the path.

Hence, option B asserts a false claim which may lead to a collision.

Learn more about 'Collision' here:

brainly.com/question/7221794

10.The following are ways to avoid having a collisionEXCEPT:a. anticipate possible situations before

ok i need help with guitar tricks can anyone help me I WILL GIVE BRAINLIEST TO FIRST ONE TO TELL ME SOMETHING THAT WORKS.

Answers

Explanation:

 the pick for guitar will help you if you need also tune it before hand

ok i need help with guitar tricks can anyone help me I WILL GIVE BRAINLIEST TO FIRST ONE TO TELL ME SOMETHING
they key is consistently and practice make sure you’re putting in effort to learn the instrument. practice scales and cords and slowly progress to rhythms and just practicing songs and stuff like that. learn an ideal hand position for your left hand (if you’re right handed) because a lot of the work is intonation and not just being able to play thing a bit play them correctly.

Hello. My Samsung tablet glitches and now its just a black screen. I've tried turning it on and off and holding down the power button but it just won't come on! Please help!

Answers

Answer:

press the volume up and down button while holding the power button, hold all three buttons til it turn on.

Explanation:

so this kinda gives the device like a reset/restart and or like it's refreshing itself!

Answer:

I tryed the 1st answer and it worked so give him brainliest.

Explanation:

Describe the disadvantages, threats, or problems associated with using message boards.

Answers

Answer:

Text-based online discussion necessarily excludes some people

The lack of physical cues in online forums may lead to miscommunication

Busy online discussion forums may cause information overload

Participants may accidentally go off-topic within a particular discussion thread

Hope this helps!

Selma needs to ensure that users who have access to her presentation are unable to make changes to the presentation.
What should she do?
O Apply password protection and only distribute the read-only password.
O Use the Mark as Final feature
O Restrict access to the presentation at the file server
O Use the Protected View option.

Answers

Use protected view option

Answer:

She should D. Use the Protected View option.

Explanation:

Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?

A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.

Answers

Answer:

C. Configure a safe sender

Explanation:

It’s dabest thing to do

As per the given scenario, Walt should need to configure a safe sender. The correct option is C.

What is configuration?

A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.

Configuration frequently involves picking the right hardware, software, firmware, and documentation.

A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.

The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.

Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.

Thus the correct option is C.

For more details regarding configuration, visit:

https://brainly.com/question/13410673

#SPJ2

GIVING OUT BRAINLIEST AND I AM ALSO WARNING EVERYONE TO NOT ANSWER A BUNCH OF rubbish just to get the points!
EXPLAIN: Describe school community or list 2-3 facts.

Answers

Hii!! I’m new but it would be an honor if you gave me a brainliest

A list of what you could say:

Friendly

Helpful

Understanding

Assertive

Thoughtful

affectionate

Happy

Compassionate

Facts: are the meals good? Is the school safe? It it a good environment?

What can macro mode on a camera be used for?

Answers

Answer:

taking photos of small things or a close up.

Explanation:

great for taking photos of bugs or flowers, it's very helpful

What is the use of an NDP?

A). identifying pointers at the other end of a network
B). sending an error message if a packet gets lost due to a bad connection
C). finding other computers on the network
D). taking an IP address from a network layer and identifying the associated MAC address

Answers

Answer:

Taking an IP address from a network layer and identifying the associated MAC address

Explanation:

Option D

It is used to measure the total economic output of a country, taking into account depreciation and capital consumption.

How do Java scripts work?!

I need the answer fast because My school homework is due tommorow!

Answers

Answer:

The way JavaScript works is interesting. Inside a normal Web page you place some JavaScript code (See How Web Pages Work for details on Web pages). When the browser loads the page, the browser has a built-in interpreter that reads the JavaScript code it finds in the page and runs it.

JavaScript is what is called a Client-side Scripting Language. ... Inside a normal Web page you place some JavaScript code (See How Web Pages Work for details on Web pages). When the browser loads the page, the browser has a built-in interpreter that reads the JavaScript code it finds in the page and runs it.

Quick, answer this please! What happens if you answer bot questions with low points? Like they say they would give you 10+ points but they only have 5 points? I am afraid I might get h a c k e d

Answers

Answer:

Hello! I haven't been h a c k e d yet so I'm pretty sure its safe.

Explanation:

Okay okay I just got the phone call from you

this is to be answered by a official or whatever i am not very happy with my answeres they are from other kids who just look it up i want most times a true answer from themselves not someone just saying blah blah online i can not figure out how to delete my profile from brainly thank you for all your help but now I am leaving.
ω

Answers

Answer:

just get banned by spamming random stuff

Explanation:

If you need help, there are tutors in this application that can help you get verified answers!

what is the answer i need them now pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls

what is the answer i need them now pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls

Answers

Answer: Insert ribbon > table drop down menu  

Explanation:

Answer:Insert ribbon > table drop down menu  

Explanation:

Describe how friction affected words what friction the results of your investigation.

Answers

Answer:

Effects of Friction

It produces heat, that helps in heating parts of any object or to warm ourselves. It also causes loss in power. It produces noise during any kind of operation. It's because of friction that we're able to walk, run, play, etc.

Friction is when something causes it to stop, slow down. A surface has to cause that change in speed.

What is the advantage of learning through story compared to learning through personal experience?

Answers

Answer:

Personal Experience

Explanation:

If a story is based on a personal experience then yes, the two doesn't matter. However, usually learning through personal experience is better because you learn firsthand while stories are written from a different perspective.

A personal experience is a first hand account or something at you experienced yourself.You can use the 5 sense to describe the situation since you were actually there,However, reading about it is a secondhand account or something that you didn’t experience and are hearing about.
Ex:Someone who was there on 911 vs someone who read about it in a textbook
Other Questions
I need help please. i feel confident identifying the resources that the people of the southeast are able to obtain because TRUE OR FALSE culture shock occurs only to migrants who involuntarily cross cultural boundaries. 34. (a) Use dimensional analysis to solve the following problems and show your work! Convert 1.45 x 104 ng to kg (3 points) 2. 4. 35 (b) Use dimensional analysis to solve the following problems and State the null and alternative hypotheses for a hypothesis test. what century was the year AD 1517 a part of Find the sum or difference. (3 7m) + 2(3. 5m +1) The sum of 16 and a number x is equal to 19 Bailey has an hour to get ready for school she spends 3/6 of that time getting dressed she spends 1/4 of that time eating breakfast The weakness in Maslow's hierarchy of needs and Herzberg's theory is that, although each one explains how motivation is caused and sustained, neither specifies what motivates individuals. You have a 0. 7 M solution. Your job is to produce 50 mL of a 0. 4 M solution. A. How much of the 0. 7 M solution do you need to start with? (Show your work. )B. How many moles of solute were in the 0. 7 M solution? (Show your work. )C. How much water do you need to add to the previous amount of the 0. 7 M solution to dilute it to0. 4 M? (Show your work. )D. A student decides to put double the amount of water calculated in Part C. Describe what effect thiswill have on the overall concentration of the resulting solution. Justify your answer. Is it okay for a citizen to rise up against the government? What/when would make this morally right or wrong? Help plssss...I soo confused.. which type of manual pull station may be confusing to certain occupant/operators? graph of the function y = x + 4 A rectangle and a triangle have the same area and the same base measurement. How does the height of the triangle compare to the height of the rectangle? Explain your answer. Which of the following can not be probed by an NMR spectrometer?A) nucleus with odd number of protons & odd number of neutronsB) nucleus with odd number of protons & even number of neutronsC) nucleus with even number of protons & odd number of neutronsD) nucleus with even number of protons & even number of neutronsE) none of these President jackson resisted the admission of texas into the union in 1836 primarily because he. Shark Dichotomous Key19 Prepare your own key for the five fish in Figure 3. Use the same format as the SharkDichotomous KeyThe family names to be used are the numbers I, II, III, IV, and V. Your key shouldcorrectly use traits that will lead to cach fish family. To help you get started thefirst statements are given Statement 1 divides the five fish into two main groupsbesed on body shape. Next, choose another characteristic that will divide the fish nothaving a tubelike body into two groups. Continue to choose characteristics that willseparate a group into smaller groups. Write your key in the space below.Figure 31. A. Fish with long tubelike body.B. Fish with body shape not tubelike.2. AFamily IGo to 2B3. ACOB4. AB.5. ABB.6. Exchange keys with a classmate. Work through it to identify the fish. Is the keycorrect? Have your classmate sign your answer sheet if your key is correct. brainietsy and 30 points if u help me